Author of the publication

Ethics and Efficacy of Unsolicited Anti-Trafficking SMS Outreach.

, , , , , and . Proc. ACM Hum. Comput. Interact., 6 (CSCW2): 1-39 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Need for Respectful Technologies: Going Beyond Privacy.. Perspectives on Digital Humanism, (2022)An Inside Look into the Practice of Malware Analysis., , , , , and . CCS, page 3053-3069. ACM, (2021)Human Perceptions of Fairness in Algorithmic Decision Making: A Case Study of Criminal Risk Prediction., , , and . WWW, page 903-912. ACM, (2018)AMP: authentication of media via provenance., , , , , , , , , and 10 other author(s). MMSys, page 108-121. ACM, (2021)Detecting fraud, corruption, and collusion in international development contracts: The design of a proof-of-concept automated system., , , and . IEEE BigData, page 1444-1453. IEEE Computer Society, (2016)"Nudes? Shouldn't I charge for these?": Motivations of New Sexual Content Creators on OnlyFans., , , and . CHI, page 666:1-666:14. ACM, (2023)Where is the Digital Divide?: A Survey of Security, Privacy, and Socioeconomics., , and . CHI, page 931-936. ACM, (2017)Leveraging Rights of Data Subjects for Social Media Analysis: Studying TikTok via Data Donations., , , , , , and . CoRR, (2023)SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors., , , , , and . CoRR, (2024)You Want Me To Do What? A Design Study of Two-Factor Authentication Messages., , and . SOUPS, USENIX Association, (2017)